A Cyber Attack On Japan Could Bring The USA To War

US secretary of state Mike Pompeo recently declared that “a cyberattack could, in certain circumstances, constitute an armed attack under Article 5 of the US-Japan Security Treaty.” The security agreement, ratified after World War II, guarantees the United States’ defense in the event of an attack on Japan.

“This is significant from the perspective of deterrence,” said Japanese defense secretary Takeshi Iwaya, also present at the briefing.

In the first such meeting between Japanese and US defense officials since 2017, the two sides shared their concerns for stability in the region.

“Geopolitical competition and coercive attempts to undermine international rules, norms, and institutions, especially from China, present challenges to the alliance,” Pompeo said.

At a time when US lawmakers argue over what constitutes state-coordinated digital espionage, definitions are in order.

According to the Japanese Defence Ministry, a cyber-attack is an “abuse of information and communications networks” in the attempt to “access, steal, falsify or destroy information.” Defense against such attacks, there were almost 130b of them against Japan in 2016, has become a pressing issue for the Japanese government. With a majority of these attacks originating from China, it’s difficult to say how the US and Japan will now respond to them.

In a statement, from their defense officials, they said actions would be merited “on a case-by-case basis, and through close consultations.”

But difficulty in tracking responsible actors poses a challenge. In February, when the Australian parliament experienced an attack on its networks, there was speculation that the attempted breach originated from China. 

The attack “suggests a state actor because it’s hard to make money from breaching a parliamentary system,” said Fergus Hanson, head of the International Cyber Policy Center in Australia.

Until simple-to-understand evidence is possible in cyber-attacks, denying as slander will remain the status quo for world powers like China.

Meanwhile, defensive cooperation between allies like the US and Japan will continue behind the scenes.And it would appear that Japan can use all the help it can get. Late last year its minister of cybersecurity admitted not knowing how to use a computer and being confused as to what USB drives are.

Quartz

You Might Also Read:

NATO Could Go To War In Response To A Cyber Attack?:

 

 

« Hackers Delight: Poor Password Security
The CIA's Cloud Contract Is Worth Billions »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Morphisec

Morphisec

Morphisec's world leading prevention-first software stops ransomware and other advanced attacks from endpoint to the cloud.

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

ActiveCyber

ActiveCyber

ActiveCyber is a source for news, reviews, learning, and technological innovation in the active cyber defense industry.

Atlantic Council Digital Forensic Research Lab (DFRLab)

Atlantic Council Digital Forensic Research Lab (DFRLab)

The Atlantic Council’s DFRLab has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

SQN Banking Systems

SQN Banking Systems

SQN Banking Systems fraud detection software products are a critical step towards overcoming the growing problem of fraud across the various payment channels.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative is an information security and cyber security company with 40-plus years of experience across industry & government.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

Deepnet Security

Deepnet Security

Deepnet Security is a leading security software developer and hardware provider in Multi-Factor Authentication (MFA), Single Sign-On (SSO) and Identity & Access Management (IAM).

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Buguard

Buguard

Buguard is a multi-award-winning supplier of Application Security Assessments and GRC services.

APIsentry

APIsentry

APIsentry is a leading provider of comprehensive API security solutions, specializing in protecting organizations from a wide range of cyber threats targeting their Application Programming Interfaces.

Stratsec

Stratsec

Stratsec is a global team of experts on a mission to protect human life, well-being and the environment against cyber-driven threats.

Consortium

Consortium

Consortium goes beyond products and promises by working with enterprises to identify, acquire, and deploy cybersecurity solutions that matter.